[PDF][PDF] Generalizing data to provide anonymity when disclosing information
P Samarati, L Sweeney - PODS, 1998 - eng.auburn.edu
The proliferation of information on the Internet and access to fast computers with large
storage capacities has increased the volume of information collected and disseminated …
storage capacities has increased the volume of information collected and disseminated …
Flexible support for multiple access control policies
Although several access control policies can be devised for controlling access to
information, all existing authorization models, and the corresponding enforcement …
information, all existing authorization models, and the corresponding enforcement …
Securing context-aware applications using environment roles
MJ Covington, W Long, S Srinivasan, AK Dev… - Proceedings of the sixth …, 2001 - dl.acm.org
In the future, a largely invisible and ubiquitous computing infrastructure will assist people
with a variety of activities in the home and at work. The applications that will be deployed in …
with a variety of activities in the home and at work. The applications that will be deployed in …
Rights protection for relational data
R Sion, M Atallah, S Prabhakar - Proceedings of the 2003 ACM SIGMOD …, 2003 - dl.acm.org
Protecting rights over relational data is of ever increasing interest, especially considering
areas where sensitive, valuable content is to be outsourced. A good example is a data …
areas where sensitive, valuable content is to be outsourced. A good example is a data …
A fine-grained access control system for XML documents
E Damiani, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …
is optimal for public information. The distribution and sharing of information via the Web that …
Delegation logic: A logic-based approach to distributed authorization
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …
A logical language for expressing authorizations
S Jajodia, P Samarati… - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A major drawback of existing access control systems is that they have all been developed
with a specific access control policy in mind. This means that all protection requirements (ie …
with a specific access control policy in mind. This means that all protection requirements (ie …
Generalized role-based access control
MJ Moyer, M Abamad - Proceedings 21st International …, 2001 - ieeexplore.ieee.org
Generalized Role-Based Access Control (GRBAC) is a new paradigm for creating and
maintaining rich access control policies. GRBAC leverages and extends the power of …
maintaining rich access control policies. GRBAC leverages and extends the power of …
A logical framework for reasoning about access control models
The increased awareness of the importance of data protection has made access control a
relevant component of current data management systems. Moreover, emerging applications …
relevant component of current data management systems. Moreover, emerging applications …
An access control model supporting periodicity constraints and temporal reasoning
Access control models, such as the ones supported by commercial DBMSs, are not yet able
to fully meet many application needs. An important requirement derives from the temporal …
to fully meet many application needs. An important requirement derives from the temporal …